|By Peter Weger||
|February 5, 2011 05:15 AM EST||
The WikiLeaks security fiasco has shed a lot of light on document security and its inherent irony: namely that the more confidential a document is, the more it's likely to be shared. Web Security Journal reached out to the CEO of Brainloop, Peter Weger, to discuss document compliance management as a risk mitigation strategy.
Web Security Journal: What security issues do you see becoming more pervasive in the coming months?
Peter Weger: A frequently unaddressed challenge is that companies’ most confidential documents are often those that travel the most outside the enterprise. Business depends on sharing information in collaborative processes like coordination among board members; working with research, supply and distribution partners; and communications with outside experts such as external counsel, consultants, auditors and regulatory authorities. However the more a document has to be accessed outside the corporate network, the greater the risk of leakage, so a company’s most sensitive documents are at much greater risk than other documents.
Web Security Journal: How do most businesses enable collaboration today?
Email continues to be the most common method used for information sharing and communication. Organizations tend to collaborate through this ubiquitous technology, sending emails to their employees, partners, suppliers and customers. These emails, of course, include content, attachments and links, some of which contain sensitive information.
To supplement email functionality, individual departments sometimes acquire Cloud-based collaboration applications, often without advice from corporate IT on the selection, vetting or implementation of these services. These systems provide rudimentary content storage, distribution and work flow that email lacks.
Web Security Journal: Where do the current methods fall short?
Weger: To state the obvious, email was not designed to be a real-time, multi-user, secure collaboration system. We know that email makes it extremely easy for security policies to be bypassed. A simple “reply all” can find an employee, either unintentionally or maliciously, sending sensitive information to one or more unintended recipients. Email and any attachments that arrive at the recipient’s mail client could be forwarded to other parties that may not have the right or need to view the information. In this latter instance, the organization that owned the data may never find out that this unexpected data sharing activity took place.
Most commercially-available Cloud-based collaboration offerings were purpose-built with a simple, primary objective of sharing information; security became an afterthought for most products. This becomes a serious risk when you consider that these products typically leave the control of the policy and access to the data in the hands of the collaboration solution provider. Some of the top-performing solutions have attempted to wrap security around the content in such a way that end users can apply document protections, requiring them to define the classification and sharing policies themselves. Of course, by putting the decision into the hands of end users with no experience in defining policy, and without the perspective of the company’s central policy standard, poor decisions could be made and sensitive data still exposed to unauthorized access and misuse. Organizations with hundreds of users have no way to ensure consistent application of security measures. In addition to putting their own documents at risk, using unsecure collaboration applications may result in companies violating their contractual obligations to protect their partners’ confidential information.
To address some of these risks, organizations continue to make significant investments in the various perimeter security technologies designed to prevent information from leaving the organization. Some of the technologies used include firewalls, network intrusion prevention systems (IPS), data loss/leak prevention (DLP) and more. The main problem with this ‘protect the perimeter’ approach is that these products focus on protecting at the infrastructure layer, not on the information itself, which must travel outside the network in order for the company to function. This effectively still leaves the user in control of the information’s destiny, which usually leads to the dangerous choice of expedience over security.
Web Security Journal: What is DCM and how does it fit in?
Weger: Document Compliance Management is a discipline that proactively manages information risk arising from sharing documents electronically.
As organizations move more of their information management processes outside the firewall to the extended enterprise, end users’ demands for collaboration come into conflict with corporate demands to protect information through consistent policy application and control over distribution. DCM seeks to reconcile these demands by creating security provisions that move with documents throughout their lifecycles, both inside and outside the network.
Web Security Journal: What are some of its applications?
Weger: Organizations that are struggling to collaborate while meeting their regulatory, compliance and governance requirements are grappling with the issues Document Compliance Management addresses. Ultimately, these organizations want to collaborate and transact securely within their communities of trust. Regulatory auditors will look for a complete audit trail that captures the entire lifecycle of the organization’s sensitive information; who had access to which documents at which point in time.
Consider the scenario in which inside counsel is required to work with outside counsel, each sharing sensitive legal documents with their counterparts on the other end. They need to maintain control over their documents after they have left the corporate network and they are required to keep a full audit trail of all document activity. They may deal with documents of varying levels of sensitivity, and need an easy way for end users to apply the appropriate controls to each document.
Another example is the Human Resources team collaborating with healthcare providers, financial services providers, state and federal tax entities, and more. Again, the documents need to be shared with trust and a full audit trail must be available to ensure that employees’ personal information has been protected as it passes to external parties. Some key components of this audit trail must document which information has been provided to which business partner, and whether or not they were able to print it, save it locally, or forward it to other people.
Web Security Journal: Why not just block all access by default?
Weger: Looking historically at security, most responses to attacks, breaches or compliance exceptions have been to shut down the operation or block the action. Years ago, when organizations experienced viruses running wild through their email systems, they simply shut down email until the problem was resolved. If they were worried about data leaving via USB sticks, they would blanket block the use of USB ports throughout the entire organization. We see this same model being applied to data protection within the collaboration space -- classify data as being sensitive and block it from being shared.
This model fails miserably. A block-by-default policy goes against the business models of today, which rely on employees, partners, suppliers, legal counsel, and other outside parties who must collaborate with each other using sensitive information.
Therefore, the main goal for DCM is to provide a secure means for end users to collaborate within corporate and regulatory policy for all approved parties, both inside and outside the organization. Corporate policy makers should risk rank business processes, define security policies and classifications, and roll them out to end users in a secure collaboration platform. This would ensure the proper use of documents, doing so in a way that is easy and transparent for the end user, without putting the end user in the unenviable position of having to make policy decisions. It must be simple enough that users will be comfortable doing their jobs within the systems they are already familiar with, as opposed to working around a protected system that is blocking them from collaborating.
Web Security Journal: What should an organization consider when implementing DCM?
Weger: Organizations should try to include these features in their own DCM programs:
- Centralized data classification, policy definition, and policy enforcement capabilities
- Enables end users to do their job without having to think about security, doing so without making them work outside of their existing business processes
- Is flexible enough to support a variety of business processes to prevent the proliferation of disparate point solutions, and can be easily integrated with the company’s existing ecosystem.
Organizations tend to focus on the tactical problems they face with data protection and often look to solve them with technology delivered by their traditional perimeter security vendor. If an organization really wants to be successful in enabling secure business collaboration, they must approach the problem at the document/information level; develop a plan to define and enable their end users, partners, and others to securely collaborate within the boundaries of their internal and/or regulatory constraints.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
Dec. 1, 2015 04:00 PM EST Reads: 499
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Dec. 1, 2015 03:00 PM EST Reads: 385
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment process from development to production scenarios using Docker containers.
Dec. 1, 2015 03:00 PM EST Reads: 145
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, demonstrated examples of com...
Dec. 1, 2015 02:45 PM EST Reads: 447
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningful and actionable insights. In his session at @ThingsExpo, Paul Turner, Chief Marketing Officer at...
Dec. 1, 2015 02:15 PM EST Reads: 451
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Dec. 1, 2015 02:00 PM EST Reads: 548
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
Dec. 1, 2015 01:45 PM EST Reads: 358
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now all corporate assets – people, objects, and spaces – can share information about themselves and thei...
Dec. 1, 2015 12:00 PM EST Reads: 310
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality.
Dec. 1, 2015 11:45 AM EST Reads: 476
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessions, I wanted to share some of my observations on emerging trends. As cyber security serves as a fou...
Dec. 1, 2015 11:45 AM EST Reads: 375
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Yet a closer inspection at the data reveals less than half of these cloud projects involve production...
Dec. 1, 2015 11:00 AM EST Reads: 514
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them to design hosted applications.
Dec. 1, 2015 10:45 AM EST Reads: 136
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
Dec. 1, 2015 10:00 AM EST Reads: 579
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" in this scenario: microservice A (releases daily) depends on a couple of additions to backend B (re...
Dec. 1, 2015 09:00 AM EST Reads: 485
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application delivery by allowing increasingly popular Mobile Backend-as-a-Service (mBaaS) platforms to quickly crea...
Dec. 1, 2015 08:00 AM EST Reads: 397
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Dec. 1, 2015 08:00 AM EST Reads: 397
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Dec. 1, 2015 08:00 AM EST Reads: 255
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Dec. 1, 2015 06:30 AM EST Reads: 515
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, wil...
Dec. 1, 2015 05:00 AM EST Reads: 623
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNub’s Data Stream Network.
Dec. 1, 2015 05:00 AM EST Reads: 362